5.4
CVE-2022-4973
- EPSS 0.94%
- Veröffentlicht 16.10.2024 07:15:12
- Zuletzt bearbeitet 30.10.2024 15:58:30
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WordPress Core < 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function
WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
Mögliche Gegenmaßnahme
WordPress: Update to one of the following versions, or a newer patched version: 3.7.39, 3.8.39, 3.9.37, 4.0.36, 4.1.36, 4.2.33, 4.3.29, 4.4.28, 4.5.27, 4.6.24, 4.7.24, 4.8.20, 4.9.21, 5.0.17, 5.1.14, 5.2.16, 5.3.13, 5.4.11, 5.5.10, 5.6.9, 5.7.7, 5.8.5, 5.9.4, 6.0.2
Weitere Schwachstelleninformationen
SystemWordPress Core
≫
Produkt
WordPress
Version
* - 3.6.1
Version
3.7 - 3.7.38
Version
3.8 - 3.8.38
Version
3.9 - 3.9.36
Version
4.0 - 4.0.35
Version
4.1 - 4.1.35
Version
4.2 - 4.2.32
Version
4.3 - 4.3.28
Version
4.4 - 4.4.27
Version
4.5 - 4.5.26
Version
4.6 - 4.6.23
Version
4.7 - 4.7.23
Version
4.8 - 4.8.19
Version
4.9 - 4.9.20
Version
5.0 - 5.0.16
Version
5.1 - 5.1.13
Version
5.2 - 5.2.15
Version
5.3 - 5.3.12
Version
5.4 - 5.4.10
Version
5.5 - 5.5.9
Version
5.6 - 5.6.8
Version
5.7 - 5.7.6
Version
5.8 - 5.8.4
Version
5.9 - 5.9.3
Version
6.0 - 6.0.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.94% | 0.755 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.4 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
| security@wordfence.com | 4.9 | 1.8 | 2.7 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.